yashab-cyber / metasploit-aiLinks
Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and machine learning capabilities. Designed for cybersecurity professionals, ethical hackers, and penetration testers,
☆25Updated 5 months ago
Alternatives and similar repositories for metasploit-ai
Users that are interested in metasploit-ai are comparing it to the libraries listed below
Sorting:
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆144Updated 11 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 7 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆36Updated 11 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆34Updated last month
- POC | Steal user WhatsApp information/data☆74Updated 8 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆187Updated 3 weeks ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆154Updated last month
- Laravel RCE Exploitation Toolkit☆49Updated 2 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 10 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year
- ☆65Updated last year
- NetProbe: Network Probe☆172Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 4 months ago
- ☆15Updated 8 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆38Updated 3 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Here are +200 different rats some with source code☆138Updated 2 years ago
- What the name says....☆104Updated last year
- A tool for automatically change the Tor IP address over time.☆123Updated 9 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆54Updated 7 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆83Updated 3 months ago
- IoT Camera Reconnaissance and Live Viewer☆170Updated last year
- ☆46Updated last month
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆142Updated last month
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆56Updated 9 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Updated 8 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated this week